A hardware Trojan is a malicious modification of an IP or IC. The modification can be inserted at any abstraction level (e.g. RTL or GDSII). A hardware Trojan is completely characterized by its physical representation and its behavior.
Security used to be about systems and software. As threats evolve, hardware engineers also have to familiarize themselves with trust and security terms and acronyms. If you are a hardware engineer interested in hardware trust and security, be sure to bookmark this page. If you spot a mistake or have ideas for enhancements, please get in touch.